Browse Definitions:
  • December 31, 2015 31 Dec'15

    Industrial Internet Consortium (IIC)

    The Industrial Internet Consortium (IIC) is a non-profit organization created for the promotion of open standards and interoperability for technologies used in industrial and machine-to-machine environments.  Continue Reading

  • December 30, 2015 30 Dec'15

    GNU project

    The GNU project is a mass collaborative initiative for the development of free software. Richard Stallman founded the project in 1978 at MIT.  Continue Reading

  • December 28, 2015 28 Dec'15

    slacktivism

    Slacktivism is taking action online in ways that involve little personal effort and have little immediate effect; the word is a portmanteau of slacker and activism.  Continue Reading

  • December 28, 2015 28 Dec'15

    dynamic voltage and frequency scaling (DVFS)

    Dynamic voltage and frequency scaling (DVFS) is the adjustment of power and speed settings on a computing device’s various processors, controller chips and peripheral devices to optimize resource allotment for tasks and maximize power-saving when ...  Continue Reading

  • December 27, 2015 27 Dec'15

    consumerism

    Consumerism is a cultural model that promotes the aquisition of goods, and especially the purchase of goods, as a vehicle for personal satisfaction and economic stimulation.  Continue Reading

  • December 25, 2015 25 Dec'15

    Twitter

    Twitter is a free social networking microblogging service that allows registered members to broadcast short posts called tweets.  Continue Reading

  • December 24, 2015 24 Dec'15

    LoRa Alliance

    The LoRa Alliance is an open, non-profit organization dedicated to promoting the interoperability and standardization of low-power wide area network (LPWAN) technologies to drive implementation of the Internet of Things (IoT).  Continue Reading

  • December 22, 2015 22 Dec'15

    Jargon File (New Hacker's Dictionary)

    The Jargon File is a compilation of computer-related slang that was first developed in 1975 by Raphael Finkel at Stanford University from sources including the Stanford and MIT AI Labs, Carnegie Mellon University and Worcester Polytechnic Institute.  Continue Reading

  • December 21, 2015 21 Dec'15

    cyberbullying

    Cyberbullying is the use of cell phones, instant messaging, e-mail, chat rooms or social networking sites such as Facebook and Twitter to harass, threaten or intimidate someone.  Continue Reading

  • December 18, 2015 18 Dec'15

    widget

    In general, widget (pronounced WID-jit) is a term used to refer to any discrete object, usually of some mechanical nature and relatively small size, when it doesn't have a name, when you can't remember the name, or when you're talking about a class ...  Continue Reading

  • December 18, 2015 18 Dec'15

    beta test

    In software development, a beta test is the second phase of software testing in which a sampling of the intended audience tries the product out.  Continue Reading

  • December 18, 2015 18 Dec'15

    Google Docs

    Google Docs is a free Web-based application in which documents and spreadsheets can be created, edited and stored online.  Continue Reading

  • December 15, 2015 15 Dec'15

    digital wallet security

    Digital wallets are used for transactions involving both conventional and digital currencies, but because the latter work differently, they require different safeguards – or at least variations on traditional security measures.  Continue Reading

  • December 15, 2015 15 Dec'15

    stingray (IMSI catcher)

    A stingray is a mobile surveillance device also known as an IMSI (International Mobile Subscriber Identity) catcher or a cell site simulator. Stingray is sold to governmental and law enforcement sectors.  Continue Reading

  • December 15, 2015 15 Dec'15

    cryptocurrency

    A cryptocurrency is a digital medium of exchange that uses encryption to secure the processes involved in generating units and conducting transactions.  Continue Reading

  • December 15, 2015 15 Dec'15

    circular economy

    A circular economy is a system in which the potential use of goods and materials is optimized and their elements returned to the system at the end of their viable life cycle.  Continue Reading

  • December 11, 2015 11 Dec'15

    collaborative consumption

    Collaborative consumption is a new approach to consumer access of goods and services; elements of the model include bartering, sharing, gifting, lending and leasing or renting.  Continue Reading

  • December 10, 2015 10 Dec'15

    limited liability company (LLC)

    A limited liability company (LLC) is a hybrid unincorporated business structure that combines the pass-through tax model of partnerships and sole proprietorships with the protection of individual assets provided by the C corporation.  Continue Reading

  • December 10, 2015 10 Dec'15

    cooperative (co-op)

    A cooperative, often shortened to “co-op,” is a business that is owned and operated by and for the benefit of its members. A cooperative is formed when several people identify an unmet need.  Continue Reading

  • December 10, 2015 10 Dec'15

    sole proprietorship

    A sole proprietorship is an unincorporated business owned by a single individual or a couple who files a single tax return.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • phishing

    Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication ...

  • vulnerability disclosure

    Vulnerability disclosure is the practice of publishing information about a computer security problem, and a type of policy that ...

  • incident response

    Incident response is an organized approach to addressing and managing the aftermath of a security breach or cyberattack, also ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • flash memory

    Flash memory, also known as flash storage, is a type of nonvolatile memory that erases data in units called blocks.

  • NAND flash memory

    NAND flash memory is a type of nonvolatile storage technology that does not require power to retain data.

  • NOR flash memory

    NOR flash memory is one of two types of nonvolatile storage technologies.

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close